Sciweavers

2570 search results - page 432 / 514
» Reliability Modeling Using UML
Sort
View
141
Voted
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
15 years 7 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
GECCO
2010
Springer
210views Optimization» more  GECCO 2010»
15 years 7 months ago
Biogeography-based optimization of neuro-fuzzy system parameters for diagnosis of cardiac disease
Cardiomyopathy refers to diseases of the heart muscle that becomes enlarged, thick, or rigid. These changes affect the electrical stability of the myocardial cells, which in turn ...
Mirela Ovreiu, Dan Simon
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
15 years 6 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
IPPS
1998
IEEE
15 years 6 months ago
The Effect of the Router Arbitration Policy on the Scalability of ServerNet
In this paper we extend a previously introduced method for optimizing the arbitration policy employed by ServerNet routers and we evaluate the method's effect on scalability....
Vladimir Shurbanov, Dimiter R. Avresky, Robert W. ...
115
Voted
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 6 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...